KeyChest Blog

Dan

Find me on:

Recent Posts

Malware Cerberus: For Hire to Steal Google 2FA

Feb 27, 2020 9:44:59 AM / by Dan posted in security

0 Comments

A new version of the "Cerberus" Android banking trojan will be able to steal one-time codes generated by the Google Authenticator app and bypass 2FA-protected accounts.

Read More

Fighting the 'Good' Internet War

Feb 26, 2020 12:06:38 PM / by Dan posted in security

0 Comments

We propose strategies for defenders to regain the initiative and push security solutions far beyond the reach of current security tools – yet those strategies start mirroring the actions and technologies of the bad guys, and confront us with important technical, legal and moral dilemmas.

Read More

Who Left the Gate Open for a Cyberattack?

Feb 25, 2020 8:20:22 PM / by Dan posted in security, risk management

0 Comments

If you make an internet call from Sydney to Texas, a technology called Border Gateway Protocol, or BGP for short, will ensure that your computer will find your friend in Texas. Just like people have to go through a border gate (or customs if you are at the airport) to enter another country, internet users have to go through a gate to access anything on the internet in another country. Internet users have unknowingly used BGP for over 30 years. The problem is that this old technology leaves the border gate wide open for a special kind of cyberattack.

Read More

25 Years of Internet Hijacking Nears Its End

Feb 25, 2020 7:56:59 PM / by Dan posted in certificate, security

0 Comments

If you make an internet call from Sydney to Texas, a technology called Border Gateway Protocol, or BGP for short, will ensure that your computer will find your friend in Texas. Just like people have to go through a border gate (or customs if you are at the airport) to enter another country, internet users have to go through a gate to access anything on the internet in another country. Internet users have unknowingly used BGP for over 30 years. The problem is that this old technology leaves the border gate wide open for a special kind of cyberattack.

Read More

Apple Safari Not Trusting Long Certs from Sept 1

Feb 23, 2020 8:28:19 PM / by Dan posted in certificate, https, keychest

0 Comments

Apple believes that SSL/HTTPS certificates valid for more than a year are not secure enough. As such the Safari browser will not be trusting certs valid for more than 13 months. Change comes on September 1. What does it mean?

Read More

FBI for passphrases - Cambridge Uni disagrees

Feb 23, 2020 5:58:01 PM / by Dan posted in security, password

0 Comments

This week, in its weekly tech advice column known as Tech Tuesday, the FBI Portland office positioned itself on the side of longer passwords. Would that really make a difference?

Read More

Microsoft HTTPS and DNS Hijacking = Big Mess

Feb 19, 2020 9:37:53 PM / by Dan posted in certificate, risk management

0 Comments

Two stories in as many weeks have flushed out some of the management problems Microsoft has with the management of its vast IT inventory - DNS and SSL.

Read More

Let's Encrypt certificate into Java JKS

Feb 19, 2020 3:44:59 PM / by Dan posted in letsencrypt

0 Comments

If you have Java applications you need to convert Linux PEM files created by Let's Encrypt clients into JKS. It's just a few steps, if you know which ones.

Read More

HTTPS Certificates - Keys and Issuers

Feb 18, 2020 8:21:14 PM / by Dan posted in certificate

0 Comments

Let's have a look at the quality of keys in internet certificates and who are the main certificate issuers.

Read More

What is the first set of tools you install on any workstation

Feb 18, 2020 4:54:49 PM / by Dan

0 Comments

Compiled from a Reddit sysadmin post, only selecting lists of tools as some are pretty good.

Read More